Windows 8

1. Windows 8 2. Module 1 - Installing and Deploying Windows 8. 3. Windows 8 editions. 4. Advantage of 64 bit Processor. 5. Minimum hardware requirement for Windows 8 6. Option for installing Windows 8 7. Installation of Windows 8 8. Upgrading and Migrating to Windows 8 9. What is Upgrading 10. What is Migration 11. Migrating User Data and Settings 12. Migrating using USMT ( User State Migration Tool ) 13. MBR - Master Boot Record 14. GUID - GPT Disk. 15. Disk Management tools. 16. Simple Volume 17. Spanned and Striped Volumes 18. Maintaining Disks, Partitions, and Volumes 19. Disk Quota 20. Device Driver in Windows 8 21. System Restore 22. LAST KNOWN GOOD CONFIGURATION 23. Configure and Trouble shoot Network Connections 24. What is an IPv4 Address 25. Default Gateway 26. Public and Private IPv4 Address 27. IPv6 Network Connectivity 28. IPv4 Address can be assigned by following types 29. Implementing Name Resolution 30. Trouble Shooting Network Connectivity 31. Implementing Wireless Security 32. Wireless network Technologies 33. What is Wireless Broadband? 34. IEEE 802.11 35. Wireless Network Configuration 36. Security Types 37. Implementing Network Security. 38. Configuring Windows Firewall 39. Ports and Application 40. Important Application, Protocol and Port Number 41. Configure Inbound and Outbound Rules 42. Securing Network traffic 43. Configuring Windows Defender 44. Managing File Access 45. NTFS Standard permission for FOLDER 46. Preventing Permission Inheritance 47. Different ways to Share Folder 48. RULE for setting NTFS + SHARE PERMISSION 49. Managing Printers 50. SkyDrive 51. Securing Windows 8 Desktop 52. User Account Types and Rights 53. Windows Authentication Methods 54. Important Security Features in Windows 8 55. Managing EFS Certificates 56. BitLocker 57. Configuring BitLocker To Go 58. UAC - User Account Control 59. Configuring Application. 60. Application Compatibility Issue 61. Resolve Common Application Compatibility Issues 62. Office 365 63. Windows Store 64. LOB (Line Of Business) and Sideloading 65. Configuring Internet Explorer Settings 66. AppLocker 67. Optimizing and Maintaining Windows 8 Client Computers 68. Performance Monitor 69. Commonly used Performance Counters 70. Resource Monitor 71. Managing Reliability of Windows 8 72. Managing Windows 8 Updates 73. Configuring Mobile Computing and Remote Access 74. Tools for Configuring Mobile Computers and Device Setting 75. Configure VPN Access 76. Data encryption 77. VPN Tunneling Protocols 78. Configure Remote Desktop and Remote Assistance 79. Remote Assistance 80. DirectAccess 81. Hyper-V 82. VHD 83. Managing Snapshot 84. Troubleshooting and Recovery Options for Windows 8 85. Enable and configure Windows 7 File Recovery 86. Advance Troubleshoot now option 87. Windows 8 System Restore 88. Using Windows PowerShell
Pr.Pg Next Pg

What is Wireless Broadband tutorials?

  • Wireless broadband is technology that provides high-speed wireless Internet access or networking access over a wide area.

  • Windows 8 provide same user interface regardless or service provider. However in order to use wireless broadband, you need to have wireless NIC adapter and Wireless Modem/Router.


Security Protocols for Wireless Network.

  • In order to protect Wireless Network from unauthorized users, various wireless Security Protocols are developed. In addition to preventing uninvited guest from connecting to your wireless network, wireless security protocols encrypt your private data transmitted over the wireless.

Point to note:-

In early days wireless networking manufactures tried to make wireless networking equipment easy but insecure.

Wireless networks are inherently insecure! Why?.

  • Wireless network are generally not as secure as wired networks. Wired networks send data between two points, which are connected by network cable. On the other hand wireless network broadcast data in every direction. These wireless data may propagate beyond the physical boundary of office or home to every device that happens to be listening. In order to protect your Wireless Network, you must configure Authentication and Encryption option.



  • In simple word Authentication verifies who you are.

  • It requires you to provide valid user credentials such as User name and Password or proof with authentication key.

  • It prevents unauthorized users from joining your wireless network.



  • Encryption sends the content of all wireless data in encrypted format so only receiver can interpret its content.

  • Encryption prevents unauthorized users from retrieving sensitive data.

  • It also helps in preventing unauthorized user from sending valid frames and accessing your private wireless network.

  • Wireless LAN supports following security standard. Each standard have own strength and weaknesses.


Security Standard

Authentication Methods

Encryption methods


IEEE 802.11

Open System,

Shared Key


Least secure, Very weak Authentication & Encryption.

Avoid using it.

IEEE 802.1X

EAP Authentication


Strong EAP method provides Stronger Authentication.




Strong Authentication using Strong EAP and TKIP.

Very Strong AES Encryption

Used for medium & large Co.




Strong Authentication using Strong PSK and TKIP.

Very Strong AES Encryption

Used for Home & Small Co.




Strong Authentication using Strong EAP and TKIP.

Very Strong AES Encryption

Used for medium & large Co.




Strong Authentication using Strong PSK and TKIP.

Very Strong AES Encryption

Used for Home & Small Co.


  • WPA (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access 2) are available in 2 modes:-



  • It is used for Home and Small Organization.

  • In this mode a Pre-shared key or passphrase is used for authentication.

  • A pre-shared key is used for authentication and is provided to each users.

  • This pre-shared key is dynamically sent between Access Point and Clients.



  • It is used for medium and Large organization.

  • This mode includes all the features of WPA Personal plus support for 802.1x RADIUS authentication.

  • It can be used only where RADIUS server is installed and Server distributes individual keys to users that have wireless designation.


Pr.Pg border                                              Next Pg